Top Stories

Virtualization Has Become Mainstream + Simplified Infrastructure Is Everything | #VMworld

Virtualization Has Become Mainstream + Simplified Infrastructure Is Everything | #VMworld

John Furrier was joined for the last day of VMworld 2013 in San Francisco by Jeff Frick and they interviewed Vanessa Alvarez, Head of Marketing at Scale Computing, for the flagship interview series theCUBE. Alvarez is a self-proclaimed "fan of converged infrastructure" and she got to talk in depth about Scale Computing, virtualization and the trends in the business. "We have a converged infrastructure of server storage and virtualization. The fact that VMware is finally bringing those pieces together is [a] testament to the fact that converged infrastructure is the future of IT." In terms of user experience, Alvarez believes "today IT... more »
The Dark Side of Failed Indie Game Development: It's no Path of Roses

The Dark Side of Failed Indie Game Development: It's no Path of Roses

The indie game developer is filled with starry eyed, hoping to make the game of their dreams. But the game development is not easy, and has many snags along the way. You’ve probably heard this before, but many indie game developers either quit or fail to finish their game projects. There are literally thousands of failures you have probably never heard of. Keith Judge, a programmer in the games industry for nearly 13 years and currently at Pitbull Studio in Guildford, working with Epic Games on Unreal Engine 4, shared his story of his experience as independent indie game developer. Not a... more »
Android is #1 – in Malware so Who Else is On The List?

Android is #1 – in Malware so Who Else is On The List?

This shouldn’t surprise anyone, Android is the top mobile malware target in the market and it wasn’t close.  79 percent of all mobile threats in 2012 had Android dead in its sights.  That finding published by Public Intelligence and the Department of Homeland Security’s Cyber Intelligence Analysis Division also indicates that mobile malware poses a threat to security personnel and emergency responders that are increasingly dependent on mobile devices in the conduct of their duties.  The report also points out how much diversity there is in base Android versions out there, a problem known as fragmentation.  That fragmentation is an... more »
Broadcom Accelerates Internet of Things with Wearable WiFi Tech

Broadcom Accelerates Internet of Things with Wearable WiFi Tech

Semiconductor maker Broadcom has introduced a new specification that enables connected devices to communicate over Wi-Fi without an access point or computer. The technology promises to open the doors for low-cost wearable gadgets that can exchange data via smartphones and tablets. Wireless Internet Connectivity for Embedded Devices (WICED) Direct, as the solution is known, has already been made available for select OEMs. Broadcom revealed that “emerging segment leaders” are in the process of developing blood pressure monitors, glucometers, smart watches and other devices that leverage WICED Direct to collect user data. "The value of a wearable device lies in its ability to connect... more »
IT Transformation Targets Increased Revenue, Risk and Cost Reduction #VMworld

IT Transformation Targets Increased Revenue, Risk and Cost Reduction #VMworld

Ted Newman, Senior Director of Cloud and IT Transformation for EMC Global Services, discussed the company's take on hybrid cloud and IT transformation in the enterprise with theCUBE co-hosts Dave Vellante and John Furrier, live at VMworld 2013. Exploring cloud trends, Newman said the solution EMC presented in their Monday session at VMworld was designed to bring apps from the public cloud back into the private cloud. As a use case example, EMC IT saved a couple million dollars by bringing apps in-house and running on VMware services. The company had developed apps for public cloud in the past, and, along with... more »
No thumbnail available

VMware Faces Uphill Fight in VDI Marketplace

VMware is an incredible company that has grown from nothing in the last decade to be a driving force in the revolution that is sweeping through IT. And Pat Gelsinger, who took over as CEO last year, is a true visionary who has made dramatic changes that have on the whole made VMware stronger. The company's growth record over the last year, this week's hugely successful VMworld 2013, and most important, its vision of the Software-Defined Data Center, are all evidence of that. A major part of that vision is VDI. When Gelsinger streamlined the company, shuttering some operations and spinning... more »
How Often Governments Knock at Facebook, Altogether 38,000 Requests in 2013

How Often Governments Knock at Facebook, Altogether 38,000 Requests in 2013

The discovery of NSA snooping has at least one positive effect: several tech companies are trying to point to sudden transparency. Almost every day there is news now about which networks with which governments work together and where they get their data. Facebook yesterday released its first “Global Government Requests Report”, which contains the government requests to Facebook in the first half of 2013. According to Facebook’s statement, the report contains all information requests by government authorities between 1 January 2013 and 30 June 2013. It is interesting and not surprising to note that the US by far the largest data hungry country on... more »
Quantum Cryptology: The Holy Grail of Data Encryption?

Quantum Cryptology: The Holy Grail of Data Encryption?

With stories of new cyberattacks hitting the headlines every other day, not too mention the fact that the NSA seems to have the ability to help itself to whatever data it wants, more advanced encryption techniques can't come soon enough. Which is why a team of British physicists' research into an encryption method called quantum cryptology is generating so much excitement. It might sound like something out of Star Trek, but quantum cryptology is very real. It's a complex technique, but it also has the potential to be a gamechanger as far as encryption goes. The physicists working on it claim... more »
VDI Now!

VDI Now!

One of the most important messages of VWworld 2013 to CIOs is you need VDI, not in 18 months, but now. And if you are not implementing VDI right now, be assured that at least some of your business units will be signing contracts with VDI-as-a-Service vendors before the end of the year. How important is this? VMware CEO Pat Gelsinger has made VDI one of the three main focus points of the streamlined, tightly focused VMware he created when he took the company over a year ago. He has named Sanjay Poonen, GM VMware End User Computing to head of... more »
Software-defined Infrastructure as a Self-driving Car | #VMworld

Software-defined Infrastructure as a Self-driving Car | #VMworld

From San Francisco, VMworld 2013, John Furrier and Dave Vellante speak with Iddo Kadim, Marketing Director, Data Center Group with Intel Corporation. Kadim's team develops solutions with the ecosystem in order to expose Intel's technologies in ways that deliver value for IT, particularly in the areas of virtualization and security. With all the hype around virtualization, people tend to forget that all these platforms run on physical infrastructure. Intel has an initiative called "Trusted Compute Pools," based on Intel Trusted Execution Technology. The lack of visibility of infrastructure in the cloud is the problem this initiative aims to address. "With Intel TXT,... more »

Premium Research

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.

- David Vellante

In the spring of 2016 we began an initiative to organize a group of CxOs to discuss the issue of cyber security. One thing we’ve learned about the topic of security is it’s hard to fake. We’re not security technology experts. As such we decided to focus on business issues. We observed heightened activity around […]

- Peter Burris

Leading digital companies are using simple top-level frameworks for setting digitization priorities. At the center of the approaches we've seen are three questions: What do we want to do better; who are we going to engage; and how are we going to institute the digital capabilities.

- George Gilbert

Enterprises must navigate the universe of big data applications by recognizing that application platforms will alternately empower and constrain enterprises along a path of ever more sophisticated applications. Data lakes, intelligent systems of engagement, and self-tuning systems of intelligence all build on each other in terms of capabilities. But the underlying platforms will evolve in a cycle of simplicity, complexity from adaptive stretch, and simplicity again via a platform refresh.

- George Gilbert

Big data products and workloads remain too immature for standard benchmarks capable of providing truly comparable results. Users that need benchmarks for contracting or comparison purposes should run their own stylized workloads based on their intended usage scenarios.

- Ralph Finos

Users considering public cloud for business and IT workloads should evaluate the types of use cases and workloads that have wide successful deployment in the public cloud today. In order to help users to better understand the customers and workloads being served in the public cloud today, Wikibon examined the brief descriptions of approximately 650 customer solution stories on the Amazon Web Services (AWS) website and classified each according on a number of characteristics. This research reveals some interesting insights about the public cloud leader’s business, and therefore about public cloud utilization generally.

- David Floyer

The Wikibon premise in this research is that this converged environment is a win-win environment for both vendors, ISVs and enterprise IT. Testing of the converged system solution is more robust, and the reduction in the number of solution types significantly lowers testing and installation costs for the vendor. ISVs can lower the cost of deployment, deliver application value faster, and drive additional upgrade value much faster. Converged enterprise IT systems (private clouds) are more agile, more reliable, more secure and have the similar costs to public clouds.

- Brian Gracely

Wikibon looks at the emerging Cloud-native application architectures. This research focused on the scope of microservices, the domains of interaction between services, and how data services and sources are changing with these new applications.

- Brian Gracely

Faced with the choices of modernizing existing applications or starting new projects, IT organizations have many options. Wikibon looks at the vast number of options today, with a methodology to evaluate choice vs. risk.

- David Floyer

There are no enterprise organizations that have married the business, digital creativity and IT as seamlessly as Weta Digital.